default search action
Amjad Mehmood
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j37]Rafiq Ullah, Amjad Mehmood, Muhammad Altaf Khan, Carsten Maple, Jaime Lloret:
An optimal secure and reliable certificateless proxy signature for industrial internet of things. Peer Peer Netw. Appl. 17(4): 2205-2220 (2024) - [j36]Rabia Khan, Amjad Mehmood, Carsten Maple, Kevin Curran, Houbing Herbert Song:
Performance Analysis of Blockchain-Enabled Security and Privacy Algorithms in Connected and Autonomous Vehicles: A Comprehensive Review. IEEE Trans. Intell. Transp. Syst. 25(6): 4773-4784 (2024) - [c6]Munir Hussain, Amjad Mehmood, Muhammad Altaf Khan, Jaime Lloret, Carsten Maple:
Performance Optimized Leader Selection Consensus Algorithm for Consortium Blockchain Using Trust Values of Nodes. CDVE 2024: 253-264 - 2023
- [j35]Amjad Mehmood, Gregory Epiphaniou, Carsten Maple, Nikolaos Ersotelos, Richard Wiseman:
A Hybrid Methodology to Assess Cyber Resilience of IoT in Energy Management and Connected Sites. Sensors 23(21): 8720 (2023) - [c5]Rafiqullah, Amjad Mehmood, Muhammad Altaf Khan, Carsten Maple, Jaime Lloret:
Zero-Knowledge Proofs based delegation authentication for Industrial Internet of Things in certificateless proxy signatures. IOTSMS 2023: 8-14 - 2022
- [j34]Ghulam Abbas, Amjad Mehmood, Carsten Maple, Gregory Epiphaniou, Jaime Lloret:
Safety, Security and Privacy in Machine Learning Based Internet of Things. J. Sens. Actuator Networks 11(3): 38 (2022) - [c4]Chen Wan, Amjad Mehmood, Carsten Maple, Gregory Epiphaniou, Jaime Lloret:
A Blockchain Based Forensic System for IoT Sensors using MQTT Protocol. IOTSMS 2022: 1-8 - 2021
- [j33]Bushra Feroz, Amjad Mehmood, Hafsa Maryam, Sherali Zeadally, Carsten Maple, Munam Ali Shah:
Vehicle-Life Interaction in Fog-Enabled Smart Connected and Autonomous Vehicles. IEEE Access 9: 7402-7420 (2021) - [j32]Fahad Saeed, Amjad Mehmood, Muhammad Faran Majeed, Carsten Maple, Khalid Saeed, Muhammad Kashif Khattak, Huihui Wang, Gregory Epiphaniou:
Smart delivery and retrieval of swab collection kit for COVID-19 test using autonomous Unmanned Aerial Vehicles. Phys. Commun. 48: 101373 (2021) - 2020
- [j31]Rashida Adeeb Khanum, Muhammad Asif Jan, Abdulaziz Aldegheishem, Amjad Mehmood, Nabil Ali Alrajeh, Akbar Khanan:
Two New Improved Variants of Grey Wolf Optimizer for Unconstrained Optimization. IEEE Access 8: 30805-30825 (2020) - [j30]Rana Abu Bakar, Abdulaziz Aldegheishem, Muhammad Faran Majeed, Amjad Mehmood, Hafsa Maryam, Nabil Ali Alrajeh, Carsten Maple, Muhammad Jawad:
An Effective Mechanism to Mitigate Real-Time DDoS Attack. IEEE Access 8: 126215-126227 (2020) - [j29]Zohaib Hassan, Amjad Mehmood, Carsten Maple, Muhammad Altaf Khan, Abdulaziz Aldegheishem:
Intelligent Detection of Black Hole Attacks for Secure Communication in Autonomous and Connected Vehicles. IEEE Access 8: 199618-199628 (2020) - [j28]Ghulam Abbas, Amjad Mehmood, Jaime Lloret, Muhammad Summair Raza, Muhammad Ibrahim:
FIPA-based reference architecture for efficient discovery and selection of appropriate cloud service using cloud ontology. Int. J. Commun. Syst. 33(14) (2020) - [j27]Khalid Khan, Amjad Mehmood, Shafiullah Khan, Muhammad Altaf Khan, Zeeshan Iqbal, Wali Khan Mashwani:
A survey on intrusion detection and prevention in wireless ad-hoc networks. J. Syst. Archit. 105: 101701 (2020) - [j26]Amjad Mehmood, Zhihan Lv, Jaime Lloret, Muhammad Muneer Umar:
ELDC: An Artificial Neural Network Based Energy-Efficient and Robust Routing Scheme for Pollution Monitoring in WSNs. IEEE Trans. Emerg. Top. Comput. 8(1): 106-114 (2020)
2010 – 2019
- 2019
- [j25]Mohammad Tehseen, Huma Javed, Amjad Mehmood, Muhammad Amin, Ishtiaq Hussain Shah, Bilal Jan:
Multi Modal Aptitude Detection System for Smart Office. IEEE Access 7: 24559-24570 (2019) - [j24]Rashid Kamal, Munam Ali Shah, Carsten Maple, Mohsin Masood, Abdul Wahid, Amjad Mehmood:
Emotion Classification and Crowd Source Sensing; A Lexicon Based Approach. IEEE Access 7: 27124-27134 (2019) - [j23]Munir Hussain, Amjad Mehmood, Shafiullah Khan, Muhammad Altaf Khan, Zeeshan Iqbal:
Authentication Techniques and Methodologies used in Wireless Body Area Networks. J. Syst. Archit. 101 (2019) - [j22]Umar Ali, Amjad Mehmood, Muhammad Faran Majeed, Siraj Muhammad, Muhammad Kamal Khan, Houbing Song, Khalid Mahmood Malik:
Innovative Citizen's Services through Public Cloud in Pakistan: User's Privacy Concerns and Impacts on Adoption. Mob. Networks Appl. 24(1): 47-68 (2019) - 2018
- [j21]Saba Arshad, Munam Ali Shah, Abdul Wahid, Amjad Mehmood, Houbing Song, Hongnian Yu:
SAMADroid: A Novel 3-Level Hybrid Malware Detection Model for Android Operating System. IEEE Access 6: 4321-4339 (2018) - [j20]Amjad Mehmood, Akbar Khanan, Abdul Hakim H. M. Mohamed, Saeed Mahfooz, Houbing Song, Salwani Abdullah:
ANTSC: An Intelligent Naïve Bayesian Probabilistic Estimation Practice for Traffic Flow to Form Stable Clustering in VANET. IEEE Access 6: 4452-4461 (2018) - [j19]Amjad Mehmood, Akbar Khanan, Muhammad Muneer Umar, Salwani Abdullah, Khairul Akram Zainol Ariffin, Houbing Song:
Secure Knowledge and Cluster-Based Intrusion Detection Mechanism for Smart Wireless Sensor Networks. IEEE Access 6: 5688-5694 (2018) - [j18]Zeyu Zhang, Amjad Mehmood, Lei Shu, Zhiqiang Huo, Yu Zhang, Mithun Mukherjee:
A Survey on Fault Diagnosis in Wireless Sensor Networks. IEEE Access 6: 11349-11364 (2018) - [j17]Amjad Mehmood, Nabil Ali Alrajeh, Mithun Mukherjee, Salwani Abdullah, Houbing Song:
A Survey on Proactive, Active and Passive Fault Diagnosis Protocols for WSNs: Network Operation Perspective. Sensors 18(6): 1787 (2018) - [j16]Abdulaziz Aldegheishem, Humera Yasmeen, Hafsa Maryam, Munam Ali Shah, Amjad Mehmood, Nabil Ali Alrajeh, Houbing Song:
Smart Road Traffic Accidents Reduction Strategy Based on Intelligent Transportation Systems (TARS). Sensors 18(7): 1983 (2018) - [j15]Ikram Ullah, Munam Ali Shah, Abdul Wahid, Amjad Mehmood, Houbing Song:
ESOT: a new privacy model for preserving location privacy in Internet of Things. Telecommun. Syst. 67(4): 553-575 (2018) - [j14]Amjad Mehmood, Mithun Mukherjee, Syed Hassan Ahmed, Houbing Song, Khalid Mahmood Malik:
NBC-MAIDS: Naïve Bayesian classification technique in multi-agent system-enriched IDS for securing IoT against DDoS attacks. J. Supercomput. 74(10): 5156-5170 (2018) - [e1]Mengxing Huang, Yan Zhang, Weipeng Jing, Amjad Mehmood:
Wireless Internet - 9th International Conference, WICON 2016, Haikou, China, December 19-20, 2016, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 214, Springer 2018, ISBN 978-3-319-72997-8 [contents] - 2017
- [j13]Amjad Mehmood, Muhammad Muneer Umar, Houbing Song:
ICMDS: Secure inter-cluster multiple-key distribution scheme for wireless sensor networks. Ad Hoc Networks 55: 97-106 (2017) - [j12]Muhammad Muneer Umar, Amjad Mehmood, Houbing Song, Kim-Kwang Raymond Choo:
I-Marks: An iris code embedding system for ownership identification of multimedia content. Comput. Electr. Eng. 63: 209-219 (2017) - 2016
- [j11]Muhammad Muneer Umar, Nabil Ali Alrajeh, Amjad Mehmood:
SALMA: An Efficient State-Based Hybrid Routing Protocol for Mobile Nodes in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 12(2): 2909618:1-2909618:11 (2016) - [j10]Amjad Mehmood, M. Nouman, Muhammad Muneer Umar, Houbing Song:
ESBL: An Energy-Efficient Scheme by Balancing Load in Group Based WSNs. KSII Trans. Internet Inf. Syst. 10(10): 4883-4901 (2016) - [j9]Jianxiong Zhou, Jiachen Yang, Houbing Song, Syed Hassan Ahmed, Amjad Mehmood, Haibin Lv:
An online marking system conducive to learning. J. Intell. Fuzzy Syst. 31(5): 2463-2471 (2016) - [j8]Jiachen Yang, Dayong Fan, Houbing Song, Syed Hassan Ahmed, Amjad Mehmood, Haibin Lv:
Multimedia security in laboratory system based on cloud platform. J. Intell. Fuzzy Syst. 31(5): 2473-2481 (2016) - [j7]Muhammad Muneer Umar, Amjad Mehmood, Houbing Song:
SeCRoP: secure cluster head centered multi-hop routing protocol for mobile ad hoc networks. Secur. Commun. Networks 9(16): 3378-3387 (2016) - [j6]Amjad Mehmood, Jaime Lloret, Sandra Sendra:
A secure and low-energy zone-based wireless sensor networks routing protocol for pollution monitoring. Wirel. Commun. Mob. Comput. 16(17): 2869-2883 (2016) - [c3]Zeyu Zhang, Lei Shu, Amjad Mehmood, Li Yan, Yu Zhang:
A Short Survey on Fault Diagnosis in Wireless Sensor Networks. WICON 2016: 21-26 - 2015
- [j5]Amjad Mehmood, Jaime Lloret Mauri, M. Noman, Houbing Song:
Improvement of the Wireless Sensor Network Lifetime Using LEACH with Vice-Cluster Head. Ad Hoc Sens. Wirel. Networks 28(1-2): 1-17 (2015) - [j4]Amjad Mehmood, Shafiullah Khan, Bilal Shams, Jaime Lloret Mauri:
Energy-efficient multi-level and distance-aware clustering mechanism for WSNs. Int. J. Commun. Syst. 28(5): 972-989 (2015) - [j3]Amjad Mehmood, Houbing Song:
Smart Energy Efficient Hierarchical Data Gathering Protocols for Wireless Sensor Networks. Smart Comput. Rev. 5(5): 425-462 (2015) - [j2]Muhammad Muneer Umar, Amjad Mehmood, Houbing Song:
A Survey on State-of-the-Art Knowledge-based System Development and Issues. Smart Comput. Rev. 5(6): 498-509 (2015) - 2014
- [j1]Amjad Mehmood, Houbing Song, Jaime Lloret:
Multi-Agent based Framework for Secure and Reliable Communication among Open Clouds. Netw. Protoc. Algorithms 6(4): 60-76 (2014) - 2012
- [c2]Muhammad Bakhsh, Amjad Mehmood:
Web Accessibility for Disabled: A Case Study of Government Websites in Pakistan. FIT 2012: 342-347 - [i1]Syed Hassan Ahmed, Safdar Hussain Bouk, Amjad Mehmood, Nadeem Javaid, Iwao Sasase:
Effect of Fast Moving Object on RSSI in WSN: An Experimental Approach. CoRR abs/1202.4137 (2012)
2000 – 2009
- 2008
- [c1]Amjad Mehmood, Abdul Ghafoor, H. Farooq Ahmed, Zeeshan Iqbal:
Adaptive Transport Protocols in Multi Agent System. ITNG 2008: 720-725
Coauthor Index
aka: Houbing Herbert Song
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:16 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint